Citation[edit | edit source]
Overview[edit | edit source]
The purpose of this publication is to help organizations centrally manage and secure mobile devices against a variety of threats. This publication provides recommendations for selecting, implementing, and using centralized management technologies, and it explains the security concerns inherent in mobile device use. The scope includes securing both organization-provided and personally-owned (bring-your-own-device) mobile devices.